{"id":263,"date":"2013-11-14T12:00:40","date_gmt":"2013-11-14T12:00:40","guid":{"rendered":"https:\/\/www.varutra.com\/blog\/?p=263"},"modified":"2022-12-02T17:18:37","modified_gmt":"2022-12-02T11:48:37","slug":"social-engineering-and-how-it-helped-us-find-a-mole","status":"publish","type":"post","link":"https:\/\/www.varutra.com\/varutravrt3\/social-engineering-and-how-it-helped-us-find-a-mole\/","title":{"rendered":"Social Engineering and How It Helped Us Find A Mole"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" width=\"1920\" height=\"1080\" src=\"https:\/\/varutra-1a3b6.kxcdn.com\/wp-content\/uploads\/2013\/11\/social-engineering-Copy-1024x590.jpg\"  class=\"sh-overlay-item sh-table-cell ls-is-cached lazyloaded\" data-rel=\"lightcase\" title=\"social engineering Copy - Varutra Consulting\"><br \/>\n<b><i><a href=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2013\/11\/SE1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-269 size-medium\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2013\/11\/SE1-300x271.png\" alt=\"Social Engineering\" width=\"300\" height=\"271\" \/><\/a><\/i><\/b><\/p>\n<p style=\"text-align: justify\">Social Engineering is essentially the art of influencing some person into doing things that \u2028he may or may\u00a0not do willingly. It is not a concept that got into picture recently, but has probably been existent since hundreds of years. Simply put, every time you try to get someone to do something that is in your interest, you are applying social engineering.<\/p>\n<p style=\"text-align: justify\">We can observe variants of social engineering in everyday life, from a student trying to escape punishment for not completing his homework, to an employee trying to land a job in a company or score a big promotion.<\/p>\n<p style=\"text-align: justify\">Social engineering can be performed either using deception or inception i.e. either using the existing trust relationship or else planting a new bond of trust. The nature of impact is vast and extent of loss solely depends upon the skills of attacker.<\/p>\n<p>The idea is to exploit the weakness in human brain to inherently trust things sooner or later.<\/p>\n<p style=\"text-align: justify\">I will try to throw an insight on Social Engineering, its types and give you a real example of a Social Engineering activity conducted by me and one of my team-mates for an organization.<\/p>\n<p>&nbsp;<\/p>\n<h3><b>Introduction<\/b><\/h3>\n<p style=\"text-align: justify\">According to me, Social Engineering is a mix of science and art.<br \/>\nIt is art when a sales person manages to sell a comb to a bald person, or a scam artist fools a house lady to give lots of money for phony lottery scheme.<\/p>\n<p style=\"text-align: justify\">It is a science, when it is used to educate people on potential dangers of misusing it, or when it is used for information gathering, market analysis and even corporate and police investigations.<\/p>\n<p>&nbsp;<\/p>\n<p>One can classify social engineering activities into two classes:<\/p>\n<h4><b>Human Based<\/b><\/h4>\n<ul>\n<li>Human based activities involve interacting with humans directly, and trying to manipulate situation to our favor.<\/li>\n<li>It may involve impersonating some other person and getting few tasks done. Communication of such sorts mostly happens over phone, where attacker may call a lady at her home acting to be her bank employee and ask her to provide her credit card number to update their new database. He may throw in names of actual employees, mention her husband\u2019s name, or tell her that she has won a reward, which will arrive at her place soon, just to increase credibility.<\/li>\n<\/ul>\n<h4><b>Technology Based <\/b><br \/>\nThese activities use computer, mobile phone to launch attacks. Attacks maybe<\/h4>\n<ul>\n<li>popups on websites, that may ask to download a software \/driver to fix computer issues<\/li>\n<li>email attachments, containing malicious PDF or image that takes control over the workstation when opened email scams, claiming to send a big reward for a small registration fee<\/li>\n<li>fake websites, either to trick user into entering credentials of their social networking accounts, or to forcibly open ads and increase their own ad clicks<\/li>\n<li>sending an SMS to victim and try to lure him\/her in giving out sensitive information to win a bogus competition\/ lottery.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h3><b>A Case Study<\/b><\/h3>\n<p style=\"text-align: justify\">The CTO of a reputed organization approached me with a concern. There had been leaks of sensitive documents from one of their offices, and he wanted to find out the source. He also wanted to ensure there weren\u2019t other ways that security breach from an outside source could occur. He asked me to help, and I agreed. \u2028We tasked ourselves to gather as much sensitive information as possible through on-site (physical) and off-site (remote) activities. \u2028Activities were supposed to yield two results: Evaluating whether the office was penetrable from an outsider or not, and finding out the employee involved in the breach of security that happened in the past. \u2028Instead of dealing with two problems separately, we decided to have a combined approach, which was partially planned, and some part had to be done as we move ahead.<\/p>\n<p>Basic plan was simple:<br \/>\n1. Gather as much information as possible about the branch, like departments, employees, events, etc.<br \/>\n2. Formulate a plan (Operation \u2018Infiltrate\u2019) for penetrating into the branch<br \/>\n3. Formulate a plan (Operation \u2018Investigate\u2019) for finding the source of the leak<br \/>\n4. Execute both plans<\/p>\n<p style=\"text-align: justify\">For our own comfort, we decided to start off with \u2018Operation Infiltrate\u2019, and execute \u2018Operation Investigate\u2019 somewhere during the time frame. \u2028Our team skimmed through the internet to find all information on the organization, its employees, organizational hierarchy etc. This involved analyzing user\u2019s social networking accounts, job sites having their profiles, blogs, forums to company website and other portals accessible publicly.<\/p>\n<p>Here is a summary of what we did, with a little insight on how it was done:<\/p>\n<h4><b>Spoofed Branding <\/b><\/h4>\n<p style=\"text-align: justify\">A half cooked lie is most likely to be caught. A good Social engineer will have spoofed almost everything he can, so that all possible calculated scenarios are under his\/her control. \u2028We created a fake website, populated with testimonials, blogs, address etc. We then created a company profile for each of us who were pretending to be the employees on the website, which we could access and show on logging-in into our \u201cEmployee Portal\u201d, just in case we need it while we are interacting with employees and need to prove our authenticity.<\/p>\n<h4><b>Enter the perimeter<\/b><\/h4>\n<p style=\"text-align: justify\">This is one of my favorite activities that give a sense that I am on a secret mission like \u201c007\u201d agent and involves some interesting physical activities.<a href=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2013\/11\/chinawall.jpeg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-272 size-full\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2013\/11\/chinawall.jpeg\" alt=\"chinawall\" width=\"257\" height=\"196\" \/><\/a><\/p>\n<p style=\"text-align: justify\">It was easy to bypass first security gate by walking\u2028in business attire with a costly watch, nice suite and leather bag with sunglasses. This gave easy access as a visitor, without getting involved in much questioning by the security guards.<\/p>\n<p style=\"text-align: justify\">While walking from main gate to respective building,\u2028I removed the jacket and sun glasses, now posing as\u2028an interviewee, looking to meet the senior HR of the company. By inquiring about the HR personnel on the inquiry desk, by name and some other information (which had been collected by our team efficiently, from the internet) gave me easy access to the floor she was sitting.<\/p>\n<p style=\"text-align: justify\">While I was sitting at floor guest area waiting for the\u2028HR personnel, I was told by the security personnel that she would be arriving soon. I tried to convince him to\u2028let me meet her on my own in an attempt to get a easy access into the employee area, but I was told to wait back.<\/p>\n<p>&#8230;continue reading on <a href=\"#\"><b>CYB3R Magazine<\/b><\/a><\/p>\n<p>&nbsp;<\/p>","protected":false},"excerpt":{"rendered":"<p>Social Engineering is essentially the art of influencing some person into doing things that \u2028he may or may\u00a0not do willingly. It is not a concept&#8230;<\/p>\n","protected":false},"author":3,"featured_media":3380,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[140,269,270,261,271],"tags":[],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.6.3 - aioseo.com -->\n\t\t<meta name=\"description\" content=\"Learn more about What is Social Engineering and how can it be used in influencing the user to carry out a task that they may or may not be willing to do?\" \/>\n\t\t<meta name=\"robots\" content=\"max-image-preview:large\" \/>\n\t\t<link rel=\"canonical\" href=\"https:\/\/www.varutra.com\/varutravrt3\/social-engineering-and-how-it-helped-us-find-a-mole\/\" \/>\n\t\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.6.3\" \/>\n\t\t<meta property=\"og:locale\" content=\"en_US\" \/>\n\t\t<meta property=\"og:site_name\" content=\"Varutra Consulting\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"Social Engineering and How It Helped Us Find A Mole\" \/>\n\t\t<meta property=\"og:description\" content=\"Learn more about What is Social Engineering and how can it be used in influencing the user to carry out a task that they may or may not be willing to do?\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/www.varutra.com\/varutravrt3\/social-engineering-and-how-it-helped-us-find-a-mole\/\" \/>\n\t\t<meta property=\"og:image\" content=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2013\/11\/social-engineering-Copy.jpg\" \/>\n\t\t<meta property=\"og:image:secure_url\" content=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2013\/11\/social-engineering-Copy.jpg\" \/>\n\t\t<meta property=\"og:image:width\" content=\"1250\" \/>\n\t\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t\t<meta property=\"article:section\" content=\"Case Study\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2013-11-14T12:00:40+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2022-12-02T11:48:37+00:00\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n\t\t<meta name=\"twitter:title\" content=\"Social Engineering and How It Helped Us Find A Mole\" \/>\n\t\t<meta name=\"twitter:description\" content=\"Learn more about What is Social Engineering and how can it be used in influencing the user to carry out a task that they may or may not be willing to do?\" \/>\n\t\t<meta name=\"twitter:image\" content=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2013\/11\/social-engineering-Copy.jpg\" \/>\n\t\t<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t\t<meta name=\"twitter:data1\" content=\"kalpadmin\" \/>\n\t\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/social-engineering-and-how-it-helped-us-find-a-mole\\\/#article\",\"name\":\"Social Engineering and How It Helped Us Find A Mole\",\"headline\":\"Social Engineering and How It Helped Us Find A Mole\",\"author\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/admin\\\/#author\"},\"publisher\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/wp-content\\\/uploads\\\/2013\\\/11\\\/social-engineering-Copy.jpg\",\"width\":1250,\"height\":720,\"caption\":\"social engineering - Copy\"},\"datePublished\":\"2013-11-14T12:00:40+05:30\",\"dateModified\":\"2022-12-02T17:18:37+05:30\",\"inLanguage\":\"en-US\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/social-engineering-and-how-it-helped-us-find-a-mole\\\/#webpage\"},\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/social-engineering-and-how-it-helped-us-find-a-mole\\\/#webpage\"},\"articleSection\":\"Case Study, Data Breaches, Data Leakage, Ethical Hacking, Social Engineering Attack\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/social-engineering-and-how-it-helped-us-find-a-mole\\\/#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"nextItem\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/social-engineering-and-how-it-helped-us-find-a-mole\\\/#listItem\"},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/social-engineering-and-how-it-helped-us-find-a-mole\\\/#listItem\",\"position\":2,\"name\":\"Social Engineering and How It Helped Us Find A Mole\",\"previousItem\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#listItem\"}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\",\"name\":\"Varutra\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/Varutra-Found-e1612984024606.jpg\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/social-engineering-and-how-it-helped-us-find-a-mole\\\/#organizationLogo\"},\"image\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/social-engineering-and-how-it-helped-us-find-a-mole\\\/#organizationLogo\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/admin\\\/#author\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/admin\\\/\",\"name\":\"kalpadmin\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/social-engineering-and-how-it-helped-us-find-a-mole\\\/#authorImage\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d69b4bf504d3e2e3c6ad0c424e16bcb2?s=96&d=mm&r=g\",\"width\":96,\"height\":96,\"caption\":\"kalpadmin\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/social-engineering-and-how-it-helped-us-find-a-mole\\\/#webpage\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/social-engineering-and-how-it-helped-us-find-a-mole\\\/\",\"name\":\"Social Engineering and How It Helped Us Find A Mole\",\"description\":\"Learn more about What is Social Engineering and how can it be used in influencing the user to carry out a task that they may or may not be willing to do?\",\"inLanguage\":\"en-US\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/social-engineering-and-how-it-helped-us-find-a-mole\\\/#breadcrumblist\"},\"author\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/admin\\\/#author\"},\"creator\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/admin\\\/#author\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/wp-content\\\/uploads\\\/2013\\\/11\\\/social-engineering-Copy.jpg\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/social-engineering-and-how-it-helped-us-find-a-mole\\\/#mainImage\",\"width\":1250,\"height\":720,\"caption\":\"social engineering - Copy\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/social-engineering-and-how-it-helped-us-find-a-mole\\\/#mainImage\"},\"datePublished\":\"2013-11-14T12:00:40+05:30\",\"dateModified\":\"2022-12-02T17:18:37+05:30\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#website\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"name\":\"Varutra Consulting\",\"description\":\"Secure your digital world with our Cybersecurity services.\",\"inLanguage\":\"en-US\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>Social Engineering and How It Helped Us Find A Mole<\/title>\n\n","aioseo_head_json":{"title":"Social Engineering and How It Helped Us Find A Mole","description":"Learn more about What is Social Engineering and how can it be used in influencing the user to carry out a task that they may or may not be willing to do?","canonical_url":"https:\/\/www.varutra.com\/varutravrt3\/social-engineering-and-how-it-helped-us-find-a-mole\/","robots":"max-image-preview:large","keywords":"","webmasterTools":{"miscellaneous":""},"og:locale":"en_US","og:site_name":"Varutra Consulting","og:type":"article","og:title":"Social Engineering and How It Helped Us Find A Mole","og:description":"Learn more about What is Social Engineering and how can it be used in influencing the user to carry out a task that they may or may not be willing to do?","og:url":"https:\/\/www.varutra.com\/varutravrt3\/social-engineering-and-how-it-helped-us-find-a-mole\/","og:image":"https:\/\/www.varutra.com\/wp-content\/uploads\/2013\/11\/social-engineering-Copy.jpg","og:image:secure_url":"https:\/\/www.varutra.com\/wp-content\/uploads\/2013\/11\/social-engineering-Copy.jpg","og:image:width":"1250","og:image:height":"720","article:section":"Case Study","article:published_time":"2013-11-14T12:00:40+00:00","article:modified_time":"2022-12-02T11:48:37+00:00","twitter:card":"summary_large_image","twitter:title":"Social Engineering and How It Helped Us Find A Mole","twitter:description":"Learn more about What is Social Engineering and how can it be used in influencing the user to carry out a task that they may or may not be willing to do?","twitter:image":"https:\/\/www.varutra.com\/wp-content\/uploads\/2013\/11\/social-engineering-Copy.jpg","twitter:label1":"Written by","twitter:data1":"kalpadmin","twitter:label2":"Est. reading time","twitter:data2":"5 minutes","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.varutra.com\/varutravrt3\/social-engineering-and-how-it-helped-us-find-a-mole\/#article","name":"Social Engineering and How It Helped Us Find A Mole","headline":"Social Engineering and How It Helped Us Find A Mole","author":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/admin\/#author"},"publisher":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization"},"image":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2013\/11\/social-engineering-Copy.jpg","width":1250,"height":720,"caption":"social engineering - Copy"},"datePublished":"2013-11-14T12:00:40+05:30","dateModified":"2022-12-02T17:18:37+05:30","inLanguage":"en-US","mainEntityOfPage":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/social-engineering-and-how-it-helped-us-find-a-mole\/#webpage"},"isPartOf":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/social-engineering-and-how-it-helped-us-find-a-mole\/#webpage"},"articleSection":"Case Study, Data Breaches, Data Leakage, Ethical Hacking, Social Engineering Attack"},{"@type":"BreadcrumbList","@id":"https:\/\/www.varutra.com\/varutravrt3\/social-engineering-and-how-it-helped-us-find-a-mole\/#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/www.varutra.com\/varutravrt3\/#listItem","position":1,"name":"Home","item":"https:\/\/www.varutra.com\/varutravrt3\/","nextItem":"https:\/\/www.varutra.com\/varutravrt3\/social-engineering-and-how-it-helped-us-find-a-mole\/#listItem"},{"@type":"ListItem","@id":"https:\/\/www.varutra.com\/varutravrt3\/social-engineering-and-how-it-helped-us-find-a-mole\/#listItem","position":2,"name":"Social Engineering and How It Helped Us Find A Mole","previousItem":"https:\/\/www.varutra.com\/varutravrt3\/#listItem"}]},{"@type":"Organization","@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization","name":"Varutra","url":"https:\/\/www.varutra.com\/varutravrt3\/","logo":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/11\/Varutra-Found-e1612984024606.jpg","@id":"https:\/\/www.varutra.com\/varutravrt3\/social-engineering-and-how-it-helped-us-find-a-mole\/#organizationLogo"},"image":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/social-engineering-and-how-it-helped-us-find-a-mole\/#organizationLogo"}},{"@type":"Person","@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/admin\/#author","url":"https:\/\/www.varutra.com\/varutravrt3\/author\/admin\/","name":"kalpadmin","image":{"@type":"ImageObject","@id":"https:\/\/www.varutra.com\/varutravrt3\/social-engineering-and-how-it-helped-us-find-a-mole\/#authorImage","url":"https:\/\/secure.gravatar.com\/avatar\/d69b4bf504d3e2e3c6ad0c424e16bcb2?s=96&d=mm&r=g","width":96,"height":96,"caption":"kalpadmin"}},{"@type":"WebPage","@id":"https:\/\/www.varutra.com\/varutravrt3\/social-engineering-and-how-it-helped-us-find-a-mole\/#webpage","url":"https:\/\/www.varutra.com\/varutravrt3\/social-engineering-and-how-it-helped-us-find-a-mole\/","name":"Social Engineering and How It Helped Us Find A Mole","description":"Learn more about What is Social Engineering and how can it be used in influencing the user to carry out a task that they may or may not be willing to do?","inLanguage":"en-US","isPartOf":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#website"},"breadcrumb":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/social-engineering-and-how-it-helped-us-find-a-mole\/#breadcrumblist"},"author":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/admin\/#author"},"creator":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/admin\/#author"},"image":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2013\/11\/social-engineering-Copy.jpg","@id":"https:\/\/www.varutra.com\/varutravrt3\/social-engineering-and-how-it-helped-us-find-a-mole\/#mainImage","width":1250,"height":720,"caption":"social engineering - Copy"},"primaryImageOfPage":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/social-engineering-and-how-it-helped-us-find-a-mole\/#mainImage"},"datePublished":"2013-11-14T12:00:40+05:30","dateModified":"2022-12-02T17:18:37+05:30"},{"@type":"WebSite","@id":"https:\/\/www.varutra.com\/varutravrt3\/#website","url":"https:\/\/www.varutra.com\/varutravrt3\/","name":"Varutra Consulting","description":"Secure your digital world with our Cybersecurity services.","inLanguage":"en-US","publisher":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization"}}]}},"aioseo_meta_data":{"post_id":"263","title":"Social Engineering and How It Helped Us Find A Mole","description":"Learn more about What is Social Engineering and how can it be used in influencing the user to carry out a task that they may or may not be willing to do?","keywords":[],"keyphrases":"{\"focus\":{\"keyphrase\":\"Social Engineering\",\"score\":90,\"analysis\":{\"keyphraseInTitle\":{\"title\":\"Focus keyphrase in SEO title\",\"description\":\"Focus keyphrase found in SEO title.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseInDescription\":{\"title\":\"Focus keyphrase in meta description\",\"description\":\"Focus keyphrase found in meta description.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseLength\":{\"title\":\"Focus keyphrase length\",\"description\":\"Good job!\",\"score\":9,\"maxScore\":9,\"error\":0,\"length\":2},\"keyphraseInURL\":{\"title\":\"Focus keyphrase in URL\",\"description\":\"Focus keyphrase used in the URL.\",\"score\":5,\"maxScore\":5,\"error\":0},\"keyphraseInIntroduction\":{\"title\":\"Focus keyphrase in introduction\",\"description\":\"Your Focus keyphrase appears in the first paragraph. Well done!\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseInSubHeadings\":{\"title\":\"Focus keyphrase in Subheadings\",\"description\":\"Use your focus keyphrase more in your H2 and H3 subheadings.\",\"score\":3,\"maxScore\":9,\"error\":1},\"keyphraseInImageAlt\":{\"title\":\"Focus keyphrase in image alt attributes\",\"description\":\"Focus keyphrase found in image alt attribute(s).\",\"score\":9,\"maxScore\":9,\"error\":0}}},\"additional\":[]}","primary_term":null,"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"featured","og_image_url":"https:\/\/www.varutra.com\/wp-content\/uploads\/2013\/11\/social-engineering-Copy.jpg","og_image_width":"1250","og_image_height":"720","og_image_custom_url":null,"og_image_custom_fields":null,"og_video":"","og_custom_url":null,"og_article_section":"Case Study","og_article_tags":[],"twitter_use_og":true,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"","isEnabled":true},"graphs":[]},"schema_type":"default","schema_type_options":"{\"article\":{\"articleType\":\"BlogPosting\"},\"course\":{\"name\":\"\",\"description\":\"\",\"provider\":\"\"},\"faq\":{\"pages\":[]},\"product\":{\"reviews\":[]},\"recipe\":{\"ingredients\":[],\"instructions\":[],\"keywords\":[]},\"software\":{\"reviews\":[],\"operatingSystems\":[]},\"webPage\":{\"webPageType\":\"WebPage\"}}","pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":"-1","robots_max_videopreview":"-1","robots_max_imagepreview":"large","priority":null,"frequency":"default","local_seo":null,"limit_modified_date":false,"open_ai":null,"created":"2021-10-27 15:18:10","updated":"2022-12-02 11:50:23"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.varutra.com\/varutravrt3\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">&raquo;<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.varutra.com\/varutravrt3\/category\/case-study\/\" title=\"Case Study\">Case Study<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">&raquo;<\/span><span class=\"aioseo-breadcrumb\">\n\tSocial Engineering and How It Helped Us Find A Mole\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/www.varutra.com\/varutravrt3"},{"label":"Case Study","link":"https:\/\/www.varutra.com\/varutravrt3\/category\/case-study\/"},{"label":"Social Engineering and How It Helped Us Find A Mole","link":"https:\/\/www.varutra.com\/varutravrt3\/social-engineering-and-how-it-helped-us-find-a-mole\/"}],"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/263"}],"collection":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/comments?post=263"}],"version-history":[{"count":6,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/263\/revisions"}],"predecessor-version":[{"id":20388,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/263\/revisions\/20388"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/media\/3380"}],"wp:attachment":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/media?parent=263"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/categories?post=263"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/tags?post=263"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}